scholarly journals Trolling the Global Citizen: The Deconstructive Ethics of the Digital Subject

2015 ◽  
Vol 23 ◽  
Author(s):  
Ben Staunton

This article compares two contemporary rhetorical figures: the ‘internet troll’, a name invoked to represent a variety of offensive and disturbing online discourse, and the narrator and main character of avant-garde English author Tom McCarthy’s debut novel Remainder (2005). By thinking about how these two figures relate to Levinas’ brand of deconstructive ethics, I attempt to develop an idea about how global communication technology (which is, including literature, an essential ingredient, inspiration and sometimes ‘form’ of the ‘global citizen’) bends our perception and performance of what is ethical. Both the troll and McCarthy’s narrator represent the necessity of understanding in a world caged in technical language describing itself. And at the same time, each figure will be shown to represent the motivating force of a global society that strives for total understanding: an absence of understanding, or in Levinasian terms, the face of the other.

2015 ◽  
Vol 23 ◽  
Author(s):  
Ben Staunton

This article compares two contemporary rhetorical figures: the ‘internet troll’, a name invoked to represent a variety of offensive and disturbing online discourse, and the narrator and main character of avant-garde English author Tom McCarthy’s debut novel Remainder (2005). By thinking about how these two figures relate to Levinas’ brand of deconstructive ethics, I attempt to develop an idea about how global communication technology (which is, including literature, an essential ingredient, inspiration and sometimes ‘form’ of the ‘global citizen’) bends our perception and performance of what is ethical. Both the troll and McCarthy’s narrator represent the necessity of understanding in a world caged in technical language describing itself. And at the same time, each figure will be shown to represent the motivating force of a global society that strives for total understanding: an absence of understanding, or in Levinasian terms, the face of the other.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 108-120 ◽  
Author(s):  
R. Kelly Garrett ◽  
Paul Resnick

Must the Internet promote political fragmentation? Although this is a possible outcome of personalized online news, we argue that other futures are possible and that thoughtful design could promote more socially desirable behavior. Research has shown that individuals crave opinion reinforcement more than they avoid exposure to diverse viewpoints and that, in many situations, hearing the other side is desirable. We suggest that, equipped with this knowledge, software designers ought to create tools that encourage and facilitate consumption of diverse news streams, making users, and society, better off. We propose several techniques to help achieve this goal. One approach focuses on making useful or intriguing opinion-challenges more accessible. The other centers on nudging people toward diversity by creating environments that accentuate its benefits. Advancing research in this area is critical in the face of increasingly partisan news media, and we believe these strategies can help.


2013 ◽  
Vol 4 (4) ◽  
pp. 1-12 ◽  
Author(s):  
Ray Gibney ◽  
Tom Zagenczyk ◽  
Marick F. Masters

Information Communication Technology (ICT) offers unions a greater capacity to build cohesion and expand membership. An important issue in assessing the potential benefits of ICT is the nature and scope of union members’ use of this technology. Unions must have an Internet presence. Using data from a 2010 Current Population Survey (CPS), the authors examine the extent to which union members have and use computers and the Internet. In addition, the authors review Facebook pages and Twitter accounts established by or for national labor organizations. The authors find that labor union usage of these social networks has not produced anticipated usage by members.


2019 ◽  
Vol 214 ◽  
pp. 08026 ◽  
Author(s):  
Raul H. C. Lopes ◽  
Virginia N. L. Franqueira ◽  
Duncan Rand

Two recent and promising additions to the internet protocols are TCP-BBR and QUIC. BBR defines a congestion policy that promises a better control in TCP bottlenecks on long haul transfers and can also be used in the QUIC protocol. TCP-BBR is implemented in the Linux kernels above 4.9. It has been shown, however, to demand careful fine tuning in the interaction, for example, with the Linux Fair Queue. QUIC, on the other hand, replaces HTTP and TLS with a protocol on the top of UDP and thin layer to serve HTTP. It has been reported to account today for 7% of Google’s traffic. It has not been used in server-to-server transfers even if its creators see that as a real possibility. Our work evaluates the applicability and tuning of TCP-BBR and QUIC for data science transfers. We describe the deployment and performance evaluation of TCP-BBR and comparison with CUBIC and H-TCP in transfers through the TEIN link to Singaren (Singapore). Also described is the deployment and initial evaluation of a QUIC server. We argue that QUIC might be a perfect match in security and connectivity to base services that are today performed by the Xroot redirectors.


2015 ◽  
Vol 32 (2) ◽  
pp. 79-106 ◽  
Author(s):  
Stephanie Simon ◽  
Marieke de Goede

Securing the internet has arguably become paradigmatic for modern security practice, not only because modern life is considered to be impossible or valueless if disconnected, but also because emergent cyber-relations and their complex interconnections are refashioning traditional security logics. This paper analyses European modes of governing geared toward securing vital, emergent cyber-systems in the face of the interconnected emergency. It develops the concept of ‘bureaucratic vitalism’ to get at the tension between the hierarchical organization and reductive knowledge frames of security apparatuses on the one hand, and the increasing desire for building ‘resilient’, dispersed, and flexible security assemblages on the other. The bureaucratic/vital juxtaposition seeks to capture the way in which cybersecurity governance takes emergent, complex systems as object and model without fully replicating this ideal in practice. Thus, we are concerned with the question of what happens when security apparatuses appropriate and translate vitalist concepts into practice. Our case renders visible the banal bureaucratic manoeuvres that seek to operate upon security emergencies by fostering connectivities, producing agencies, and staging exercises.


2005 ◽  
Vol 04 (02) ◽  
pp. 297-309 ◽  
Author(s):  
A. O. IDOWU ◽  
PETER ADEBAYO IDOWU ◽  
E. R. ADAGUNODO

The phenomenal growth of information and communication technology (ICT) especially the Internet has affected youths in developed and developing countries alike. Although progressing at a slower rate in developing countries than in any other parts of the world, Internet connectivity is also transforming the face of Africa. This paper presents a study that examines what Nigerian youths use Internet for and which of the Internet use has adverse effect on the youth's social life. It reveals that majority of youths use Internet for e-mail, making use of Yahoo followed by Hotmail, and the study also reveals that over 50% of youths interviewed visit pornographic sites.


2020 ◽  
Vol 26 (2) ◽  
Author(s):  
Riska Hendika Rani

<p><strong>This research examines Little Bee’s social identity change based on Chris Cleave’s novel entitled <em>the Other Hand. </em>The object of this research focuses on the Little Bee’s social identity change. The method used in this research is critical reading. To collect the data, the researcher did some steps including reading the novel closely and intensively, making notes, visiting library, and exploring the data from the internet which are related to the topic. In analyzing the data, the researcher used descriptive qualitative method.</strong></p><strong>After conducting the research, the researcher got several research findings. They are: 1). The reason of Little Bee’s social identity change are her envy towards British people’s easy life, her needs to tell her sad story, her will to survive, and her desire to overcome her past. 2). The way Little Bee learns her new identity is by reading, such as novels and newspaper, practicing how to pronounce and speak, looking for difficult words in her dictionary in order to learn the language, and learning the British life by watching television and reading books to understand the British lifestyle.</strong>


2019 ◽  
Vol 10 (2) ◽  
pp. 108-118
Author(s):  
Moh Rifaldi Akbar

The development of communication technology and the Internet era has led to changes in the donation behavior of the public. According to the Spectator Index 2019, Indonesia as the nation was noted as the most generous nation in the World. Since 2012 the emergence of websites and applications are practicing. The emergence of websites with the aim of crowdfunding raises questions about the charity and practice of capitalism. With all the conveniences provided from mobile-accessible applications, fast internet, mobile banking, apps and websites featuring social issues where the audience can donate and replace the conventional way of donating. On the other hand, crowdfunding-based website such as kitabisa.com impose a 5% percent tax on each charity transaction provided. The ease given in the era of the internet coupled with the presence of the website initiated the way of thinking and new standards in donation practice. Previous studies have not yet fully addressed the cultural backgrounds that underpin a person to make a charity in the era of the internet in which there is a growing of website and internet era. This paper attempts to fill the void by seeing the connection between the Internet era, the website, the behavioral practices and digital captialism with a critical paradigm. This article will search anthropologically by using a netnography method with the goal of digging an audience-based experience through an online-based application or website.


Author(s):  
Gonca Telli Yamamoto

While mobile intrusion comes to life insidiously, it has been affecting our lives in many different ways. At first social networking and some implementations such as mobile dating comes to mind. On the other hand, mobile literacy and educational implementations are evolving and spreading rapidly with the facilities of mobile systems. Having turned into one of the most important elements that trigger and develop the social genes in the twentieth century, communication technology is also drawing the attention with its impacts that direct socialization. Internet and cyberspaces which are used in mobile communication create communication organs with their multi but non-conflicting features for person to person connections, where individuals focus on a unity through the utilization of different modes to connect (Urry, 2002). This environment is suitable to create virtual societies where many people join with various reasons and they should also be considered in terms of marketing. The inclusion of people on the Internet as social actors evokes gathering metaphor on the background. General behaviors of any kind of gathering such as chatting, discussing, challenging and keeping secrets are also seen on this platform (Sproull & Faraj, 1997). Chat rooms, organized clubs, facebook type of websites, and virtual games are places where people spend time or perform communication-based activities.


2020 ◽  
Vol 32 (1) ◽  
pp. 105-122
Author(s):  
Miguel Clemente ◽  
Dolores Padilla-Racero

The socialization that parents and society exercise on children instills in them a set of values towards parents. Some of these values are not lying, feeling affection for the parents, and wanting to have contact with them. In this work, we attempt to determine whether these values change in the face of intrafamilial abuse.  To that end, an incidental sample was used, consisting of 2730 minors aged between 6 to 18 years, who had never suffered abuse. They were asked to put themselves in the place of the main character of a story. The story varied depending on the conditions to be studied: observation and direct suffering or account of the abuse by another, type of abuse (physical or psychological), who perpetrated the abuse (custodian or non-custodial), and who received it (the other custodian or the minor). The results show that, as a rule, children lie to conceal both parents’ abusive behavior; they love their parents and want to have contact with them, even in the presence of abuse. Notwithstanding that in the presence of abuse by one of their parents, children still love them and want to have contact with both parents, a significant number of children, however, stop loving them or want to have contact with the abusive parent. These results undermine what is defended by theories like PAS with no scientific evidence, and underline the need to use scientific procedures to test the reliability of minors’ testimony based on the idea that children tell the truth.


Sign in / Sign up

Export Citation Format

Share Document